| CPC G06F 21/105 (2013.01) [G06F 21/106 (2023.08)] | 20 Claims |

|
1. A computer-implemented method, comprising:
receiving, from a third party, a report on a pirated copy of a digital content, the report comprising first secret information for characterizing a first identification, time information and tracing information of the pirated copy, the time information indicating a creation time of the first secret information, the pirated copy being a leaked version of an authorized copy of the digital content which is authorized by a content owner to a licensee determined from a first index retrieved using a hash value of the tracing information;
receiving a request for verifying the report, the request comprising second secret information and a second identification of the third party, the second secret information characterizing the tracing information and the time information;
determining whether the report is valid by evaluating the first secret information, the second secret information, and the second identification using records from a distributed ledger; and
if the report is determined as valid, storing an evidence record associated with the report in the distributed ledger and updating a status record of the licensee in the distributed ledger with a first status, the first status indicating an inference that the pirated copy was leaked by the licensee.
|